Found: 25
Select item for more details and to access through your institution.
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection.
- Published in:
- International Journal of Information Security, 2025, v. 24, n. 1, p. 1, doi. 10.1007/s10207-024-00920-1
- By:
- Publication type:
- Article
An efficient secure and energy resilient trust-based system for detection and mitigation of sybil attack detection (SAN).
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.2231
- By:
- Publication type:
- Article
Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.2043
- By:
- Publication type:
- Article
An Intrusion Detection System for the Internet of Things Based on Machine Learning: Review and Challenges.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 6, p. 1011, doi. 10.3390/sym13061011
- By:
- Publication type:
- Article
Dynamic Job Scheduling Strategy Using Jobs Characteristics in Cloud Computing.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 10, p. 1638, doi. 10.3390/sym12101638
- By:
- Publication type:
- Article
Hyper-Heuristic Framework for Sequential Semi-Supervised Classification Based on Core Clustering.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 8, p. 1292, doi. 10.3390/sym12081292
- By:
- Publication type:
- Article
A Taxonomy of Load Balancing Techniques in Cloud Computing.
- Published in:
- International Review on Computers & Software, 2013, v. 8, n. 1, p. 64
- By:
- Publication type:
- Article
MeanFailureCP-SMF and StaticCP-SMF.
- Published in:
- International Review on Computers & Software, 2012, v. 7, n. 2, p. 511
- By:
- Publication type:
- Article
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks.
- Published in:
- Electronics (2079-9292), 2023, v. 12, n. 4, p. 867, doi. 10.3390/electronics12040867
- By:
- Publication type:
- Article
A Review of Bring Your Own Device on Security Issues.
- Published in:
- SAGE Open, 2015, v. 5, n. 2, p. 1, doi. 10.1177/2158244015580372
- By:
- Publication type:
- Article
Flow Table Overflow Attacks in a Software-Defined Network (SDN): A Systematic Review.
- Published in:
- IAENG International Journal of Computer Science, 2024, v. 51, n. 9, p. 1219
- By:
- Publication type:
- Article
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2016, v. 2016, n. 1, p. 1, doi. 10.1186/s13638-016-0566-8
- By:
- Publication type:
- Article
An Enhanced Discrete Symbiotic Organism Search Algorithm for Optimal Task Scheduling in the Cloud.
- Published in:
- Algorithms, 2021, v. 14, n. 7, p. 200, doi. 10.3390/a14070200
- By:
- Publication type:
- Article
Correction to: The Impact of Memory‑Efficient Bots on IoT‑WSN Botnet Propagation.
- Published in:
- 2021
- By:
- Publication type:
- Correction Notice
The Impact of Memory-Efficient Bots on IoT-WSN Botnet Propagation.
- Published in:
- Wireless Personal Communications, 2021, v. 119, n. 3, p. 2093, doi. 10.1007/s11277-021-08320-7
- By:
- Publication type:
- Article
A Network Selection Algorithm Based on Enhanced Access Router Discovery in Heterogeneous Wireless Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 77, n. 3, p. 1733, doi. 10.1007/s11277-014-1606-5
- By:
- Publication type:
- Article
Replication Strategy with Comprehensive Data Center Selection Method in Cloud Environments.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 415, doi. 10.32604/cmc.2023.020764
- By:
- Publication type:
- Article
Replication Strategy with Comprehensive Data Center Selection Method in Cloud Environments.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 415, doi. 10.32604/cmc.2023.020764
- By:
- Publication type:
- Article
A HIGH AVAILABILITY CLUSTER-BASED REPLICA CONTROL PROTOCOL IN DATA GRID.
- Published in:
- Journal of Information & Communication Technology, 2017, v. 16, n. 1, p. 43
- By:
- Publication type:
- Article
A HIGH PERFORMANCE UCON AND SEMANTIC-BASED AUTHORIZATION FRAMEWORK FOR GRID COMPUTING.
- Published in:
- Journal of Information & Communication Technology, 2016, v. 15, n. 1, p. 183, doi. 10.32890/jict2016.15.1.9
- By:
- Publication type:
- Article
A particle swarm optimization and min-max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 5, p. 2018, doi. 10.1007/s11227-016-1901-x
- By:
- Publication type:
- Article
Optimized performance data transmission in Mobile IP networks.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 2, p. 906, doi. 10.1007/s11227-014-1267-x
- By:
- Publication type:
- Article
Crucial File Selection Strategy (CFSS) for Enhanced Download Response Time in Cloud Replication Environments.
- Published in:
- Baghdad Science Journal, 2021, v. 18, p. 1356, doi. 10.21123/bsj.2021.18.4(Suppl.).1356
- By:
- Publication type:
- Article
Quality of Service Class Identifier (QCI) radio resource allocation algorithm for LTE downlink.
- Published in:
- PLoS ONE, 2019, v. 14, n. 1, p. 1, doi. 10.1371/journal.pone.0210310
- By:
- Publication type:
- Article
The Rapid Vertical Handover for Efficient IPv6 Mobility Support in Heterogeneous Wireless Networks.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2014, v. 39, n. 2, p. 851, doi. 10.1007/s13369-013-0718-7
- By:
- Publication type:
- Article